| vicente | I am ready when you are :) |
| fernand0 | ok, lets go |
| fernand0 | Hello |
| fernand0 | it is our pleasure to have today here Mr. Vicente Aceituno. He is member |
| fernand0 | of ISECOM, The Institute for Security and Open Methodologies |
| fernand0 | (visit |
| fernand0 | them: http://www.isecom.org/ |
| fernand0 | _later_ :) |
| fernand0 | ) |
| fernand0 | He is the author of ISM3 1.0. - |
| fernand0 | Information Security Management Maturity Model and he is going to talk |
| fernand0 | about it here. |
| fernand0 | He has written a book on security: "Seguridad de la Información", Creaciones Copyright. Only in Spanish at the moment, sorry. |
| fernand0 | |
| fernand0 | The talk will be here. We will try to provide translation in #redes, and |
| fernand0 | the channel for questions and comments is #qc. |
| fernand0 | |
| fernand0 | La presentación será en este canal. Trataremos de hacer la traducción en |
| fernand0 | #redes, y hemos habilitado #qc para preguntas y comentarios. |
| fernand0 | |
| fernand0 | vicente ... |
| vicente | Thanks, fernand0 |
| vicente | Well, I'd like to talk first about |
| vicente | the motivation to write ISM3 |
| vicente | I findother |
| vicente | ISMS standards |
| vicente | to have |
| vicente | points of view that aim |
| vicente | for invulnerability |
| vicente | Which I think is both wrong |
| vicente | and discouraging for thos who CAN do something |
| vicente | about their infosec |
| vicente | but don't have a lot of resources. |
| vicente | The first good idea |
| vicente | I gathered for ISM3 |
| vicente | was the CMM maturity levels |
| vicente | that many of you will know |
| vicente | A second important point |
| vicente | was the wide difference between |
| vicente | ISO9001 and BS7799-2 certifications |
| vicente | When companies are good at somethinf |
| vicente | they like to show it |
| vicente | There are around 450000 |
| vicente | companies ISO9001 certified, while less than |
| vicente | a thousand are BS7799-2 certified |
| vicente | BS7799-2 by the way, was the only ISMS |
| vicente | that was accreditable |
| vicente | So ISO9001 is important too |
| vicente | It goes without saying |
| vicente | that management systems have limitations |
| vicente | They more |
| vicente | cited one is that they don't |
| vicente | guarantee results. |
| vicente | But the same way an MBA means you know |
| vicente | about business, that doesn't mean |
| vicente | you will be successful at business |
| vicente | An accredited ISMS says you |
| vicente | are doing something to have repeatable |
| vicente | and improving process |
| vicente | where mistakes are not repeated over and over again. |
| vicente | I think a ISMS should help you all the way |
| vicente | Saying What, Why, Where, When, etc. |
| vicente | ISM3 works out to answer most of these questions... |
| vicente | while taking into consideration that resources are not infinte |
| vicente | and that every organization has a different threat scenario. |
| vicente | Another important thing about ISM3 |
| vicente | is that the confidenciality, avaliability, integrity paradigm is dropped |
| vicente | as it is nearly worhtless to solve security problems |
| vicente | I hope this is shocking for most of you. |
| vicente | The traditional definition of a security incident is |
| vicente | a failure to provide CIA |
| vicente | In ISM3 terms, an incident is a failure to meet a security objective. |
| vicente | Security objectives are organization and threat scenario dependent |
| vicente | Let's imagine a small organization without any worthwhile secrets. |
| vicente | Instead of analyzing possible Confidencilaity loss problems, |
| vicente | that would later be dropped as irrelevant... |
| vicente | secrecy is never brought into the analysis |
| vicente | because is wouldn't be a security objective of the organization. |
| vicente | ISM3 helps to know |
| vicente | who should perform each process |
| vicente | using three management levels |
| vicente | strategic, tactical and operational |
| vicente | BSA is probably not very popular here... |
| vicente | but on of thier documents on informatiopn security governance brung this STO idea, |
| vicente | which I find very useful to determine security responsibilites. |
| vicente | strategy sets direction and provides resorurces... |
| vicente | tactics manage the resources |
| vicente | and operations do the real work preventing and mitigating incidents. |
| vicente | Another good thing about ISM3 |
| vicente | is that it describes processes. |
| vicente | and the documents that define them |
| vicente | in such a way that paticular activities or their frequency are not specified. |
| vicente | This makes ISM3 compatible with all current best practices in the security field |
| vicente | So you don't have top drop all your ISMS to adapt to ISM3 |
| vicente | As documentation is specified with ISO9001 in mind |
| vicente | You can accredit ISM3 the same way you accredit any other quality management system |
| vicente | Well,,, |
| vicente | I think I am ready for some questions. |
| vicente | Questions and Answers in the #qc channel |
| vicente | Ok, as there no qa, I'll caryy on. |
| vicente | Metrics are measured |
| vicente | in ISM3 using Security Targest |
| vicente | While Security Objectives are qualitative |
| vicente | Security Targets are quantitative. |
| vicente | For example, you might state "Losses due to malware won't exceed 5000 euro a year" |
| vicente | Using security targets you know |
| vicente | if your ISMS is working or not |
| vicente | Whereas when you aim for invulnerability |
| vicente | and there's an incident... |
| vicente | Is the ISMS working? Or there is a certain rate of incidents you can expect no matter what you do? |
| vicente | You can adjust your investment |
| vicente | in security using security targets. |
| vicente | , avoiding to be trapped inm FUD tactics |
| vicente | "buy this or horrible things will happen to your company" |
| vicente | ISM3 has four maturity levels |
| vicente | but these are not compulsory. |
| vicente | Every company must choose what are the processes best suited |
| vicente | to their resources and threat profile. |
| vicente | Maturity levels just describe somehow |
| vicente | consistent ISM systems that are accreditable. |
| vicente | For example Level 1 has teh following processes: |
| vicente | SSP-1 Report to Stakeholders |
| vicente | SSP-2 Coordination. |
| vicente | SSP-3 Strategic vision. |
| vicente | SSP-6 Allocate resources for information security. |
| vicente | TSP-1 Report to strategic management. |
| vicente | TSP-2 Manage allocated resources. |
| vicente | TSP-3 Define Security Targets. |
| vicente | TSP-12 Select Specific Processes. |
| vicente | OSP-1 Report to tactical management. |
| vicente | OSP-5 Environment Patching. |
| vicente | OSP-10 Backup & Redundancy Management. |
| vicente | OSP-16 Segmentation and Filtering Management. |
| vicente | OSP-17 Malware Protection Management. |
| vicente | Most of these are managerial stuff |
| vicente | But if you run a small company, What are the most important things you can do for your security? |
| vicente | Backup |
| vicente | Use anti-malware |
| vicente | Patch |
| vicente | Firewall |
| vicente | Using ISM3 you could accredit that you are doing all the important things, while devoting a minimum of resources. |
| vicente | So your company is not invulnerable, but it is reasobly well protected. |
| vicente | And you can show it |
| vicente | To bring this to a closure |
| vicente | I'd like to tell you about TPSRSR |
| vicente | Separation of duties is popular |
| vicente | But to prevent Fraud |
| vicente | Corruption, Theft, etc |
| vicente | business processes need to go beyond that |
| vicente | TPSRSR stands for Transparency, Partitioning, Separation and Rotation of Responsibilities |
| vicente | Transparency helps fight corruption |
| vicente | Partitioning helps prevent that important responsibilities are allocated to multiple roles, or none |
| vicente | Separation helps prevent that a business process is subverted by a single person |
| vicente | And Rotation makes more difficult for people with separated responsibilities to collaborate to exploit business processes in their benefit. |
| vicente | For more information, visit isecom.org |
| vicente | My personal web page, by the way is http://www.seguridaddelainformacion.com/seg_0e.htm (Advice on PC security) |
| MJesus | clap clap clap clap clap clap clap clap clap clap |
| MJesus | clap clap clap clap clap clap clap clap clap clap |
| MJesus | clap clap clap clap clap clap clap clap clap clap |
| MJesus | clap clap clap clap clap clap clap clap clap clap |
| RaD|Tz | http://solobsd.org |
| damage | bravo |
| fernand0 | plas plas plas plas plas plas plas plas plas plas |
| fernand0 | plas plas plas plas plas plas plas plas plas plas |
| fernand0 | plas plas plas plas plas plas plas plas plas plas |
| fernand0 | plas plas plas plas plas plas plas plas plas plas |
| felix | jaime: unlog |
The Organizing Comittee